Description
AdaptiveGRC is vulnerable to Stored XSS via text type fields across the forms. Authenticated attacker can replace the value of the text field in the HTTP POST request. Improper parameter validation by the server results in arbitrary JavaScript execution in the victim's browser. Critically, this may allow the attacker to obtain the administrator authentication token and perform arbitrary actions with administrative privileges, which could lead to further compromise. This issue occurs in versions released before December 2025.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Product status
5.420.00 (custom) before 5.420.66
5.420.00 (custom) before 5.444.119
5.420.00 (custom) before 5.448.116
5.420.00 (custom) before 5.453.110
5.420.00 (custom) before 5.454.64
5.420.00 (custom) before 5.455.87
5.420.00 (custom) before 5.456.60
5.420.00 (custom) before 5.499.113
5.420.00 (custom) before 5.420.14
5.420.00 (custom) before 5.423.7
5.420.00 (custom) before 5.444.20
5.420.00 (custom) before 5.448.42
5.420.00 (custom) before 5.449.40
5.420.00 (custom) before 5.453.19
5.420.00 (custom) before 5.454.17
5.420.00 (custom) before 5.456.20
Credits
Antoni Kwietniewski (mBank)
References
cert.pl/posts/2026/04/CVE-2026-4313
adaptivegrc.com/pl/wszystkie-procesy-grc-w-jednym-narzedziu/